Welcome to the NHSmail Local Administrator webinar
|
|
- Sylvia Harrison
- 5 years ago
- Views:
Transcription
1 Welcome to the NHSmail Local Administrator webinar The webinar will begin at 11am. Participant lines will be muted during the presentation. The video option will be turned off. The webinar will be recorded. We will not be taking questions / comments via the chat facility during this session we will provide further detail about this at the start of the webinar. 1
2 NHSmail Local Administrator webinar Wednesday 23 January 2019 at 11am
3 Agenda Anti-spoofing General service information o Business Continuity and Disaster Recovery (BCDR) testing o Closed organisations Service updates o Account management lifecycle o Skype for Business desktop control o Local helpdesk contact details in People Finder 3
4 Anti-spoofing David Middleton Service Management, NHS Digital 4
5 Anti-spoofing The anti-spoofing project has been introduced to prevent the practice of spoofing from a source over the internet which imitates being from address. communications are being sent to the top spoofing organisations, Chief Clinical Information Officer (CCIO) / Chief Information Officer (CIO) community, Local Administrators and users. Weekly spoofing calls are being held with individual organisations and we are providing reports on their specific spoofed s. Guidance, and numbers, can be provided for individual organisations requiring specific help by contacting feedback@nhs.net Downward trend of the numbers of spoofed continues, 55% reduction 262k now from 590k. Anti-spoofing policy change will be reintroduced Tuesday 12 February 2019 which will move s into the Junk folder. Phase 2 of the project (to block spoof s from the NHSmail service completely) will be confirmed at a later date. 5
6 Anti-spoofing Typical software applications in scope: HOOF - Identified four suppliers BOC, Air Liquide, Dolby Vivisol, Baywater Healthcare Datix new version of software available v Condeco contact in progress PECOS aware and able to support organisations with spoofing changes SafeGuard advice is to follow NHSmail published guidance Scan to mail advice and guidance - Xerox, Canon, Ricoh aware and able to support spoofing changes Mass mailer product advice and guidance - Mailchimp guidance has been published Mail relay option not supported within NHSmail, review Applications Guide Organisations with forwarder rules will need to follow NHSmail published guidance to avoid spoofing 6
7 What action do I need to take? Discuss the spoofing change with your local IT Director/ Senior Information Risk Officer (SIRO) / CIO to confirm what actions have already been put in place and ensure they are aware what will happen on 12 February If no action has been taken, complete a self assessment of the typical software applications listed or those that interlink with NHSmail to gauge impact on your organisation. Using the guidance, ensure an action plan is put into place to stop spoofing. Communicate with your user base, advising them to check their Junk folder, perhaps highlighting the Junk folder by adding it to favourites. If help is required, please contact feedback@nhs.net Join the weekly spoofing call, details can be requested from feedback@nhs.net Specific Local Administrator spoofing call with be held on 6 February
8 Additional resources Further information is available within the Policy and Guidance pages under General Guidance > Anti-spoofing controls Guidance on spoofing Applications Guide Portal Local Administrator Guide 8
9 Questions? 9
10 General service information David Middleton Service Management, NHS Digital 10
11 Business Continuity and Disaster Recovery (BCDR) testing Business Continuity and Disaster Recovery (BCDR) testing will be taking place over the weekend of the 2 / 3 March We do not expect any impact on end users during the course of the testing, however Local Administrators should review their local business continuity arrangements as a precaution. If there are any organisations involved in self-migration NHSmail activity, a pause should be planned over the BCDR test weekend. Organisations who have hard-coded IP addresses to the NHSmail Relay rather than using relay.nhs.uk may encounter some disruption. 11
12 Closed organisations Clean-up work has started, to remove closed organisations from the NHSmail service. This will help ensure that all NHSmail accounts reside within open organisations that are legal entities and that are responsible for ensuring information governance compliance and good practice. Local Administrators, shared mailbox owners and users of active accounts within closed organisations will be contacted, to initiate this process. 12
13 Questions? 13
14 Service updates Tom Blackmore Service Management, Accenture 14
15 Account management lifecycle Local Administrators will be aware of the ongoing deletion of eligible accounts, which has been running on a weekly basis since October 2018 as part of the account management lifecycle hygiene process. We are increasing the number of deletions that will take place each week from 15,000 to a maximum of 30,000 accounts, subject to the identification of eligible accounts in line with the Data Retention and Information Management Policy. Accounts in scope for deletion each week will continue to be issued with communications two weeks ahead of the deletion activity. Local Administrators can now restore accounts in a deleted status if required via the User Management screen in the NHSmail Portal. Further guidance is available in the Portal Local Administrator Guide, in section Restoring an account. 15
16 Skype for Business desktop control A new feature in Skype for Business is now available, allowing an NHSmail user to delegate control of their applications or desktops that they are sharing during a conference session. This will only be available between nhs.net users. The Skype for Business User Guide is currently being updated with further details. 16
17 Local helpdesk contact details in People Finder Local Administrators are now able to update the Local Support and Telephone number fields within the Manage Organisation screens in the Portal. The information populated in these fields is now more prominent on the People Finder pages where an organisation s Local Administrators are listed. The aim is to ensure that where a local IT support function exists, users are directed to that function for NHSmail issues and requests rather than contacting Local Administrators directly. The Portal Local Administrator Guide has been updated with further details on how to change the information held in these fields, in section Viewing and editing organisation attributes. 17
18 Questions? 18
19
Welcome to the NHSmail LA webinar
Welcome to the NHSmail LA webinar The webinar will begin at 11am. Please synchronise your web and phone presence by inputting your Attendee ID into the phone. Participant lines will be muted during the
More informationWelcome to the NHSmail LA webinar
Welcome to the NHSmail LA webinar The webinar will begin at 11am. Please synchronise your web and phone presence by inputting your Attendee ID into the phone. Participant lines will be muted during the
More informationNHSmail LOA webinar. Tuesday 23 August. Hayley Miller Engagement Lead, NHS Digital Chris Gibbons Communications Lead, Accenture
NHSmail LOA webinar Tuesday 23 August Hayley Miller Engagement Lead, NHS Digital Chris Gibbons Communications Lead, Accenture Welcome to the NHSmail LOA webinar The webinar will begin at 2pm. Please synchronise
More informationWelcome to the NHSmail Skype for Business webinar
Welcome to the NHSmail Skype for Business webinar The webinar will begin shortly. Please synchronise your web and phone presence by inputting your Attendee ID into the phone Participant lines will be muted
More informationNHSmail: social care overview. April 2018
NHSmail: social care overview April 2018 Contents NHSmail overview What does it offer? NHSmail centrally funded core service Joining NHSmail Overview Pre-requisites NHSmail benefits Transforming communications
More informationSocial care: local sponsorship model application process guidance
Social care: local sponsorship model application process guidance Published August 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental
More informationNHSmail Migration Communications Plan Template
NHSmail Migration Communications Plan Template June 2018 Version 2 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationSkype for Business File Transfer
File Transfer File Transfer enables users to send files to each other in a Peer-to-Peer scenario. Meeting Attachments allow users to upload files to a Conference Session for other users to download. The
More informationNHSmail 2 User Transition Guide
NHSmail 2 User Transition Guide Version 3.0 Published 30 June 2016 Update Log Key Updated Sections Users will receive their 4GB mailbox quota once their mailbox transitions to NHSmail 2 Refer to the Service
More informationWELCOME TO THE WEBINAR NHSMAIL SERVICE BRIEFING
WELCOME TO THE WEBINAR NHSMAIL SERVICE BRIEFING The webinar will begin at 1.30pm. Please synchronise your web and phone presence by inputting your Attendee ID into the phone. Participant lines will be
More informationWelcome to the webinar - meeting the secure standard
Welcome to the webinar - meeting the secure email standard The webinar will begin at 10.00am. Please synchronise your web and phone presence by inputting your Attendee ID into the phone. Participant lines
More informationHow to complete the NHSmail Social Care Provider Registration Portal
How to complete the NHSmail Social Care Provider Registration Portal April 2018 Version 1 Copyright 2018 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental
More informationISB Secure Standard
Is the requirement to join the PSN still required? Could you clarify the implications to any organisation that doesn't meet the 1596 security standard by 30th June 2017 Will TLS setup need to be mandatory
More informationBravoAdvantage 16. Preparing for the Upgrade. Hannah Coulthard Product Manager
BravoAdvantage 16 Preparing for the Upgrade Hannah Coulthard Product Manager 2 Agenda BravoSolution 16 release considerations Helping you to prepare for the release Materials BravoSolution is providing
More informationCorporate Information Security Policy
Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed
More informationBirmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018
1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess
More informationPharmacy - Frequently Asked Questions
Pharmacy - Frequently Asked Questions Published October 2017 Version 4 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body
More informationCORE Voluntary Certification: Certification from the Testing Vendor s Perspective. February 18, :00 3:00pm ET
CORE Voluntary Certification: Certification from the Testing Vendor s Perspective February 18, 2015 2:00 3:00pm ET Participating in Today s Session Download a copy of today s presentation on the CAQH.org
More informationNHSmail Managed Migrations Implementation Guide
Document filename: NHSmail Managed Migrations Implementation Guide Status Final Owner Tom Hewitt Version 1.2 Author Tom Hewitt Version issue date 07/06/2017 NHSmail Managed Migrations Implementation Guide
More informationContents Introduction... 2 Why our nhs.uk s are changing to nhs.net... 2 How big will my NHS.net mailbox be?... 2 How big are my nhs.
Contents Introduction... 2 Why our nhs.uk emails are changing to nhs.net... 2 How big will my NHS.net mailbox be?... 2 How big are my nhs.uk and nhs.net mail boxes?... 3 What will happen to my emails in
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More informationBusiness Continuity Policy
Business Continuity Policy Version Number: 3.6 Page 1 of 14 Business Continuity Policy First published: 07-01-2014 Amendment record Version Date Reviewer Comment 1.0 07/01/2014 Debbie Campbell 2.0 11/07/2014
More informationCyber Security Guide for NHSmail
Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,
More informationPublic Safety Canada. Audit of the Business Continuity Planning Program
Public Safety Canada Audit of the Business Continuity Planning Program October 2016 Her Majesty the Queen in Right of Canada, 2016 Cat: PS4-208/2016E-PDF ISBN: 978-0-660-06766-7 This material may be freely
More informationLogging an Incident on Datix Web
Logging an Incident on Datix Web Contents How to Log an Incident Using Datix Web... 4 Section 1 What happened?... 4 Section 2 - What Type of Incident is this?... 5 Section 3 Doctor Review for Patient-Related
More informationInformation Technology Access Control Policy & Procedure
Information Technology Access Control Policy & Procedure Version 1.0 Important: This document can only be considered valid when viewed on the PCT s intranet/u: Drive. If this document has been printed
More informationAccessing Encrypted s Guide for Non-NHSmail users
Accessing Encrypted Emails Guide for Non-NHSmail users April 2017 Version 2.1 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental
More informationINFORMATION SECURITY AND RISK POLICY
INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:
More informationInformation Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Colin Sloey Implementation Date: September 2010 Version Number:
More informationNEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE
COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:
More informationINFORMATION ASSET MANAGEMENT POLICY
INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives
More informationAgenda. 1 Intelligent Communications. 2 Considerations. 3 Partner Approach, Tools & Resources. 4 Partner Guidance & Checklist
Microsoft Teams: Agenda 1 Intelligent Communications 2 Considerations 3 Partner Approach, Tools & Resources 4 Partner Guidance & Checklist Microsoft Teams Communicate through chat, meetings & calls Collaborate
More informationStrategic Data Collection Service (SDCS) for General Collections
Strategic Data Collection Service (SDCS) for General Collections External User Guidance Date: March 2018 Contact Details Email: data.collections@nhs.net Telephone: 0300 303 5678 1 Contents 5.1 Accounts
More informationInformation Security Strategy
Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone
More informationStrategic Data Collection Service (SDCS) for General Collections
Strategic Data Collection Service (SDCS) for General Collections External User Guidance Date January 2017 Contact Details Email: data.collections@nhs.net Telephone: 0300 303 5678 1 Contents Contents 2
More informationBOARD OF DIRECTORS (OPEN) Meeting Date: 14 th November 2018
BORD OF DIRECTORS (OPEN) Meeting Date: 14 th November 2018 Open BoD 14.11.18 Item 14 TITLE OF PPER TO BE PRESENTED BY CTION REQUIRED Senior Information Risk Owner (SIRO) nnual Report Phillip Easthope,
More informationEncryption Guide for NHSmail
Encryption Guide for NHSmail December 2017 Version 3 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,
More informationUser manual for applying online for certification under the Health and Disability Services (Safety) Act 2001
User manual for applying online for certification under the Health and Disability Services (Safety) Act 2001 Introduction Information is available to current or potential providers of health and disability
More informationVMware BCDR Accelerator Service
AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution
More informationDefensible Security DefSec 101
Defensible Security DefSec 101 Security Day November 2017 Information Security Branch Paul Falohun Senior Security Analyst Dan Lathigee Senior Project Manager Content 1 Introduction 2 DefSec for PSO 3
More informationEEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1,
EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1, 2008 www.morganlewis.com Overview Reliability Standards Enforcement Framework Critical Infrastructure Protection (CIP)
More informationGuidance for sending and receiving an encrypted NHSmail
Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted
More informationRemote Access (Supporting Document)
Remote Access (Supporting Document) April 2007 Version Control Sheet Title: Purpose: Owner: Approved by: Remote Access (Supporting Document The advise staff of the councils policy and procedures regarding
More informationApplication Decommissioning in Digital Transformation
Application Decommissioning in Digital Transformation Produced by In cooperation with MARCH 2018 CONTENTS Role of Application Decommissioning in Digital Transformation 3 What is application decommissioning?...
More informationNHSmail mobile configuration guide Apple iphone
The Apple iphone 3GS, 4 and 5 support encryption at rest. The iphone 3G and iphone 2G will not connect to NHSmail NHSmail mobile configuration guide Apple iphone V.7 June 2013 THIS INFORMATION IS FOR NHS
More informationManchester Metropolitan University Information Security Strategy
Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History
More informationCounty of Sacramento
Chief Information Officer Patrick Groff County Executive Terry Schutten County of Sacramento DATE: January 30, 2008 TO: FROM: SUBJECT: Agency Administrators and Department Directors Patrick Groff, Chief
More informationThe ehealth Annual Report aims to highlight the activities within the teams that make up the ehealth Department.
Board paper 18/41 THE STATE HOSPITALS BOARD FOR SCOTLAND Date of Meeting: 28 June 2018 Agenda Reference: Item No: 21 Sponsoring Director: Author(s): Title of Report: Purpose of Report: Finance and Performance
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationCritical HIPAA Privacy & Security Crossover Areas
Critical HIPAA Privacy & Security Crossover Areas Presented by HIPAA Solutions, LC Peter MacKoul, JD Senior Privacy SME Ken Hughes Senior Security SME HIPAA Solutions, LC 2016 1 Critical HIPAA Privacy
More informationInformation Security Controls Policy
Information Security Controls Policy Version 1 Version: 1 Dated: 21 May 2018 Document Owner: Head of IT Security and Compliance Document History and Reviews Version Date Revision Author Summary of Changes
More informationNHS Fife. 2015/16 Audit Computer Service Review Follow Up
NHS Fife 2015/16 Audit Computer Service Review Follow Up Prepared for NHS Fife April 2016 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability (Scotland)
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationDATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, DOMINGUEZ HILLS. Audit Report June 15, 2012
DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, DOMINGUEZ HILLS Audit Report 12-31 June 15, 2012 Henry Mendoza, Chair William Hauck Steven M. Glazer Glen O. Toney Members, Committee on Audit University
More informationPutting It All Together:
Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,
More informationData Encryption Policy
Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager
More informationINFORMATION TECHNOLOGY SECURITY POLICY
INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin
More informationICT Portable Devices and Portable Media Security
ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data
More informationLOUGHBOROUGH UNIVERSITY RESEARCH OFFICE STANDARD OPERATING PROCEDURE. Loughborough University (LU) Research Office SOP 1027 LU
LOUGHBOROUGH UNIVERSITY RESEARCH OFFICE STANDARD OPERATING PROCEDURE Loughborough University (LU) Research Office SOP 1027 LU Process for Writing Study Protocols for NHS Research Sponsored by Loughborough
More informationAneurin Bevan Health Board
Aneurin Bevan Health Board Information Governance Committee Minutes of the meeting held on 10 February 2010, 2pm, in the Small Boardroom, Mamhilad House Present: Prof Janet Wademan - Independent Member
More informationGlobal Statement of Business Continuity
Business Continuity Management Version 1.0-2017 Date January 25, 2017 Status Author Business Continuity Management (BCM) Table of Contents 1. Credit Suisse Business Continuity Statement 3 2. BCM Program
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationCYBERSECURITY IN THE POST ACUTE ARENA AGENDA
CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities
More informationLifeline Program Update. National Verifier Updates May 17, 2017
Lifeline Program Update National Verifier Updates May 17, 2017 1 Housekeeping Audio is available through your computer s speakers The audience will remain on mute Enter questions at any time using the
More informationHIPAA Privacy, Security and Breach Notification
HIPAA Privacy, Security and Breach Notification HCCA East Central Regional Annual Conference October 2013 Disclaimer The information contained in this document is provided by KPMG LLP for general guidance
More informationNHSmail 2 Project Board Wednesday 8 th June2016 5C1, Skipton House, London / Barnard, Vantage, Leeds
NHSmail 2 Project Board Wednesday 8 th June2016 5C1, Skipton House, London / Barnard, Vantage, Leeds 1030-1230 Members Present in London Dr Simon Eccles (SE) Senior Responsible Owner (Chair) Cleveland
More informationIdentification and Authentication
Identification and Authentication Example Policy Author: A Heathcote Date: 24/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre
More informationEDRMS Document Migration Guideline
Title EDRMS Document Migration Guideline Creation Date 23 December 2016 Version 3.0 Last Revised 28 March 2018 Approved by Records Manager and IT&S Business Partner Approval date 28 March 2018 TABLE OF
More informationNPCC Compliance Monitoring Team Classroom Session
NPCC Compliance Monitoring Team Classroom Session John Muir - Director, Compliance Monitoring Jacqueline Jimenez - Senior Compliance Engineer David Cerasoli, CISSP - Manager, CIP Audits 5/14/2018 1 Compliance
More informationHow to Respond to a HIPAA Breach. Tuesday, Oct. 25, 2016
How to Respond to a HIPAA Breach Tuesday, Oct. 25, 2016 This Webinar is Brought to You By. About HealthInsight and Mountain-Pacific Quality Health HealthInsight and Mountain-Pacific Quality Health are
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationUniversity Information Technology Data Backup and Recovery Policy
University Information Technology Data Backup and Recovery Policy I. Purpose and Scope A. The purpose of this policy is to document the University of Utah Information Technology (UIT) data backup and recovery
More informationIndividual Funding Requests (IFR) Guidance notes for referrers (GPs and Referring Clinicians)
Individual Funding Requests (IFR) Guidance notes for referrers (GPs and Referring Clinicians) ClaimIT User Guide Practice Managers (June 2016) 1 Index Item Description Page 1 Frequently asked questions
More informationNHS e-referral Service Transition Planning WebEx May 2015
NHS e-referral Service Transition Planning WebEx May 2015 Issued 19.05.15 V3.0 Purpose of this webinar and key messages To reassure users that they do not need to worry about the change to NHS e-referral
More informationt a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e foresightconsulting.com.
e info@ Mr. James Kavanagh Chief Security Advisor Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 19 August 2015 Microsoft CRM Online IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,
More informationClient Services Procedure Manual
Procedure: 85.00 Subject: Administration and Promotion of the Health and Safety Learning Series The Health and Safety Learning Series is a program designed and delivered by staff at WorkplaceNL to increase
More informationComplaint Handling Procedure and Escalation Policy
Complaint Handling Procedure and Escalation Policy COPYRIGHT STATEMENT This document is the property of Nottingham Rehab Ltd. and may not, without our express written consent, be copied in whole or in
More informationGuide for hosting a WebEx
Guide for hosting a WebEx Contents INTRODUCTION... 2 HOW CAN I ACCESS WEBEX... 2 SETTING UP A WEBEX SESSION AS A HOST... 4 HINTS AND TIPS SHEET... 9 Preparation... 9 Meeting Etiquette... 9 Technology...
More informationNHSmail User Provisioning
NHSmail User Provisioning Version 2.0 Contents 1 Introduction 3 1.1 Purpose 3 2 NHSmail Object Types 4 2.1 Users 4 2.2 Contacts 5 2.3 Pre-provisioned Accounts 6 3 Provisioning Methods 6 3.1 Portal Based
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More informationEX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101
EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic
More informationCritical Infrastructure Protection Version 5
Critical Infrastructure Protection Version 5 Tobias Whitney, Senior CIP Manager, Grid Assurance, NERC Compliance Committee Open Meeting August 9, 2017 Agenda Critical Infrastructure Protection (CIP) Standards
More informationGENERAL PRIVACY POLICY
GENERAL PRIVACY POLICY Introduction The Australian Association of Consultant Pharmacy Pty Ltd (ACN 057 706 064) (the AACP) is committed to protecting the privacy of your personal information. This privacy
More informationInformation backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013
Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board Issued: September 2013 Document reference: 495A2013 Status of report This document has been prepared for the internal
More informationMedical records movement
England Primary Care Support England Medical records movement A guide for general practice staff to the new process 1. Receiving records 2. Sending records 3. Returning temporary resident forms What s
More informationGMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017
GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015
More informationVirginia State University Policies Manual. Title: Information Security Program Policy: 6110
Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including
More informationUsing Cisco Unified MeetingPlace for IBM Lotus Notes
Using Cisco Unified MeetingPlace for IBM Lotus s Limitations When Scheduling Cisco Unified MeetingPlace Meetings From IBM Lotus s, page 1 How to Schedule a Meeting, page 2 Rescheduling a Meeting, page
More informationISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic
ISO 22301: An Overview of BCM Implementation Process Presenter: Dejan Kosutic GoToWebinar Control Panel Open and close your Panel View, Select, and Test your audio Submit text questions they will be addressed
More informationGateshead Schools Curriculum
Gateshead Schools Curriculum E-mail @Gatedu.org A setup guide to getting started with Office 365 E-Mail, Calendar, Tasks, Global Address List and OneDrive Logging in procedures Using any web browser, type
More informationCyber Review Sample report
IT Governance Cyber Review Sample report Protect Comply Thrive Cyber Review Report Prepared for Evelyn Murphy, Chief Information Officer, Baratheon PLC HLCR Sample Report Copyright IT Governance Ltd 2017
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationBCS Practitioner Certificate in Information Risk Management Syllabus
BCS Practitioner Certificate in Information Risk Management Syllabus Version 6.5 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification in Wales,
More informationMember of the County or municipal emergency management organization
EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,
More informationCorporate Governance and Internal Control
01 20 Lawson 93 Lawson strives to enhance Corporate Governance by improving the soundness and transparency of management, through ensuring compliance and affirmative disclosure. Overall view of Lawson
More informationGuide to cyber security/cip specifications and requirements for suppliers. September 2016
Guide to cyber security/cip specifications and requirements for suppliers September 2016 Introduction and context The AltaLink cyber security/cip specification and requirements for suppliers (the standard)
More informationSupporting the NHS to Improve Cyber Security. Presented by Chris Flynn Security Operations Lead NHS Digital s Data Security Centre
Supporting the NHS to Improve Cyber Security Presented by Chris Flynn Security Operations Lead NHS Digital s Data Security Centre https://www.youtube.com/watch?v=3bqt7zkkq JA 2 Start with why And why it
More informationDirector, Major Projects and Resilience. To: Planning and Performance Committee 6 November 2014
Item Number: B1 By: Director, Major Projects and Resilience To: Planning and Performance Committee 6 November 2014 Subject: Classification: KENT RESILIENCE TEAM Unrestricted FOR DECISION SUMMARY This report
More informationBackup and Restore SOP FOR CONGO CLUSTER
Backup and Restore SOP FOR CONGO CLUSTER IT Department, Congo Cluster Version 1.0 January 2008 1. Contents 1. CONTENTS... 2 2. INTRODUCTION TO BACKUPS... 3 2.1. Objectives... 3 2.2. Scope of the document...
More information